Re: [decade] FW: Last Call: <draft-farrell-decade-ni-07.txt> (Naming Things with Hashes) to Proposed Standard

"Martin J. Dürst" <duerst@it.aoyama.ac.jp> Tue, 12 June 2012 09:49 UTC

Return-Path: <duerst@it.aoyama.ac.jp>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 810F721F8619 for <ietf@ietfa.amsl.com>; Tue, 12 Jun 2012 02:49:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.652
X-Spam-Level:
X-Spam-Status: No, score=-99.652 tagged_above=-999 required=5 tests=[AWL=0.138, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, MIME_8BIT_HEADER=0.3, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iaPqDZN9gxOh for <ietf@ietfa.amsl.com>; Tue, 12 Jun 2012 02:49:42 -0700 (PDT)
Received: from scintmta02.scbb.aoyama.ac.jp (scintmta02.scbb.aoyama.ac.jp [133.2.253.34]) by ietfa.amsl.com (Postfix) with ESMTP id 6B35D21F85CD for <ietf@ietf.org>; Tue, 12 Jun 2012 02:49:42 -0700 (PDT)
Received: from scmse02.scbb.aoyama.ac.jp ([133.2.253.231]) by scintmta02.scbb.aoyama.ac.jp (secret/secret) with SMTP id q5C9nbY8000722 for <ietf@ietf.org>; Tue, 12 Jun 2012 18:49:37 +0900
Received: from (unknown [133.2.206.133]) by scmse02.scbb.aoyama.ac.jp with smtp id 7680_3a9c_ec1ba358_b473_11e1_9745_001d096c5782; Tue, 12 Jun 2012 18:49:37 +0900
Received: from [IPv6:::1] ([133.2.210.1]:58138) by itmail.it.aoyama.ac.jp with [XMail 1.22 ESMTP Server] id <S15D16AD> for <ietf@ietf.org> from <duerst@it.aoyama.ac.jp>; Tue, 12 Jun 2012 18:49:41 +0900
Message-ID: <4FD710AD.9030505@it.aoyama.ac.jp>
Date: Tue, 12 Jun 2012 18:49:33 +0900
From: "\"Martin J. Dürst\"" <duerst@it.aoyama.ac.jp>
Organization: Aoyama Gakuin University
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.9) Gecko/20100722 Eudora/3.0.4
MIME-Version: 1.0
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [decade] FW: Last Call: <draft-farrell-decade-ni-07.txt> (Naming Things with Hashes) to Proposed Standard
References: <E33E01DFD5BEA24B9F3F18671078951F23A88B0C@szxeml534-mbx.china.huawei.com> <CAGnGFMKjv2QR+ebynnC2GktpYf2QEx73n+0_ZZeyJrAmTYDnjg@mail.gmail.com> <4FD0FDC2.2090802@cs.tcd.ie> <CAGnGFMLc15-ZkD_Of7k0zK7ef-i6HN2LsPCfbW3pkwFkpSiOfA@mail.gmail.com> <4FD1E048.8080507@cs.tcd.ie>
In-Reply-To: <4FD1E048.8080507@cs.tcd.ie>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: Jonathan A Rees <rees@mumble.net>, ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jun 2012 09:49:43 -0000

Hello Stephen, others,

On 2012/06/08 20:21, Stephen Farrell wrote:
>
> Hiya,
>
> On 06/08/2012 01:35 AM, Jonathan A Rees wrote:
>> On Thu, Jun 7, 2012 at 3:15 PM, Stephen Farrell
>> <stephen.farrell@cs.tcd.ie>  wrote:
>>>
>>> On 06/06/2012 09:33 PM, Jonathan A Rees wrote:

>>>> ---------- Forwarded message ----------
>>>> From: Jonathan A Rees<rees@mumble.net>
>>>> Date: Sun, May 6, 2012 at 7:57 PM
>>>> Subject: comments on http://tools.ietf.org/html/draft-farrell-decade-ni-06
>>>> To: Alexey Melnikov<alexey.melnikov@isode.com>, Barry Leiba
>>>> <barryleiba@computer.org>, "S. Farrell"<stephen.farrell@cs.tcd.ie>,
>>>> "P. Hallam-Baker"<pbaker@verisign.com>
>>>>
>>>> Here are some opinions on
>>>> http://tools.ietf.org/html/draft-farrell-decade-ni-06 :
>>>>
>>>> I think this URI scheme would be a welcome addition to web
>>>> architecture. Wide review should be sought, because this might become
>>>> quite important and if there are problems they will be very difficult
>>>> to fix later.
>>>>
>>>> I think using .well-known is a good idea.
>>>>
>>>> I think integration into the ecosystem, such as browser support,
>>>> should be anticipated; for this reason I think content type should be
>>>> elevated from an 'optional feature' to a 'required feature'.
>>>>
>>>> [i.e. conformant implementations must support it, even if providing
>>>> the content type in the URI is itself optional.]
>>>
>>> I could certainly live with that, and I suspect my co-authors too,
>>> but I'd need to ask 'em. However, we'd like to see more support for
>>> it before doing that. If we only hear from you on this, then I
>>> think leaving it in the other draft would be right. (See below
>>> for why we want to keep that draft.) I guess others have a few
>>> weeks to chime in on this.


>> It is certainly strongly promoted by the W3C web architecture document, see
>> http://www.w3.org/TR/webarch/#internet-media-type
>> so I think I have W3C consensus (as of 2005) behind my claim.
>
> Well I could argue that that says that protocols SHOULD
> do stuff and we're just defining the URI here and not a
> protocol. But let's see if we get more input on this.

Sophistry is great, but security is better :-).

Seriously, (1) URIs can be seen as (extremely small) protocols, (2) they 
are used in many protocols and formats, which might be better served 
with having the content type being taken care off rather than having to 
do it on their own, and (3) in order for the protocols to do the right 
stuff, they need the right information.



>>>> I agree with other commenters on the peculiarity of using // to
>>>> provide the location hint since the named host is not being trusted as
>>>> an authority. I don't understand why the 'primary' location isn't just
>>>> encoded in the query, just like the alternate domain(s) and "wrapped
>>>> URL(s)".  This would have the nice property that you can put the
>>>> identifying parts (i.e. hash and content type) first, and the less important
>>>> location hints parts all together after the identification. The various
>>>> location hints (whether primary or secondary) would go together and
>>>> their similarity would be clearer.
>>>>
>>>> (Unless I'm misunderstanding something and the part after the //
>>>> actually has status other than a hint?  That would seem to defeat
>>>> the purpose.)
>>>
>>> I think we could argue this (and we did already between the authors;-)
>>> and it'd come down to "pick a way." We did already and wrote code
>>> for that, so we'd prefer to stick with it as-is, especially if there's
>>> no compelling reason to change. I think its likely we can agree that
>>> there's no compelling differences here in whether we use "//" or
>>> a "?loc=" or whatever.
>>
>> Well, you have a chance to fix this now, and it will be impossible to
>> fix later.
>
> Its true we won't be able to change this later but not true
> IMO that any fix is needed, now or later.
>
>> Using // is contrary to RFC 3986, which very clearly says
>> "governance of the name space defined by the remainder of the URI is
>> delegated to that authority". This is certainly not what this URI
>> scheme does, so use of // is contrary to the appicable normative spec.
>
> I disagree. The full quote there is:
>
>    "Many URI schemes include a hierarchical element for a naming
>     authority so that governance of the name space defined by the
>     remainder of the URI is delegated to that authority (which may, in
>     turn, delegate it further)."
>
> There are no SHOULDs nor MUSTs there with which we're not
> complying, and "many" != "all." Yes, ni URIs differ in some
> respects from HTTP URLs, but if they didn't then this draft
> wouldn't be needed, so that's ok.

In my opinion, the decision on whether to use the authority part or not 
is probably more a theoretical one than a practical one. Either way 
seems to be fine. Strictly speaking on abstract "authority" grounds, the 
mailto: URI could have used // because mumble.net is the authority for 
mail to rees@mumble.net.

But I agree with Jonathan that once we start putting other information 
such as full URIs from which the resource can be retrieved, alternate 
'authorities' where it may be available, and so on, after the hash, then 
putting all that stuff there seems cleaner.

Regards,   Martin.